Posts

Security Fundamentals

Back to Basics: Why Security Fundamentals Matter More Than Ever

By Frank Costa, President, Nexgen Protection Services

In today’s complex threat landscape, advanced tools and analytics are important — but the fundamentals of security protection matter more than ever.

  • Effective security operations are built on:
  • Ethical decision-making
  • Fact-based, unbiased investigations
  • Clear, defensible documentation
  • Alignment with enterprise risk and compliance objectives

When these basics are weak, even the most sophisticated technology cannot compensate. Investigations become inconsistent. Documentation fails under scrutiny. Risk decisions drift away from governance standards.

The foundation for disciplined security work is well established. ASIS International emphasizes structured investigative processes and documentation standards to ensure credibility, transparency, and defensibility (ASIS International, 2015). Likewise, the framework developed by the Committee of Sponsoring Organizations of the Treadway Commission (COSO) reinforces that internal controls, risk assessment, and governance alignment are essential to protecting organizational value (COSO, 2017).

Security leaders should equip their teams with a clear Investigations Standard — outlining principles, processes, reporting protocols, and oversight mechanisms. This ensures:

  • Consistency across cases
  • Protection of employee rights
  • Legal and regulatory defensibility
  • Alignment with enterprise risk strategy

Strong security fundamentals create operational integrity. Operational integrity builds executive trust.  And executive trust strengthens enterprise resilience.

In security protection, excellence is rarely about doing something extraordinary. It’s about doing the ordinary — exceptionally well.

References (APA 7th ed.)
ASIS International. (2015). Investigations standard. ASIS International.
Committee of Sponsoring Organizations of the Treadway Commission. (2017). Enterprise risk management—Integrating with strategy and performance. COSO.

#SecurityLeadership #Investigations #CorporateSecurity #RiskManagement #Governance #Compliance #OperationalExcellence #EnterpriseRisk

 

Corporate Security

Corporate Security Doesn’t Collapse Overnight — It Drifts.

By Frank Costa, President, Nexgen Protection Services

In Corporate America, major security failures rarely begin with one dramatic breach. They develop through small gaps, missed indicators, and delayed decisions.

  • An access badge that isn’t deactivated.
  •  A phishing email that isn’t reported.
  •  A vendor risk review pushed to “next quarter.”
  •  An employee who hesitates to escalate a concern.

Over time, these small gaps align — and the result is financial loss, reputational damage, regulatory exposure, or even physical harm.

High-performing corporate security programs operate differently.

Drawing on the principles outlined by Karl E. Weick and Kathleen M. Sutcliffe, High Reliability Organizations (HROs) maintain a preoccupation with failure and a constant awareness of operational risk (Weick & Sutcliffe, 2015). They assume vulnerabilities exist and actively search for them.

Similarly, James T. Reason’s model of layered defenses reminds us that breaches occur when multiple minor control failures align — not because of one catastrophic error (Reason, 1997).

For corporate security leaders, this means:

  • Treating near-miss cyber incidents as intelligence
  • Escalating anomalies early — even when data is incomplete
  • Empowering employees to report suspicious behavior without fear
  • Stress-testing physical, digital, and vendor controls regularly
  • Ensuring executive leadership visibly supports security culture

Security resilience is not built in crisis response — it’s built in everyday vigilance.

The strongest organizations don’t wait for certainty.
They act on weak signals.

Because in corporate environments, failure is rarely sudden.
It’s cumulative.

References (APA 7th ed.)
Reason, J. T. (1997). Managing the risks of organizational accidents. Ashgate.
Weick, K. E., & Sutcliffe, K. M. (2015). Managing the unexpected: Sustained performance in a complex world (3rd ed.). Jossey-Bass.

#CorporateSecurity #EnterpriseRisk #SecurityLeadership #OperationalRisk #CyberSecurity #PhysicalSecurity #RiskManagement #BusinessResilience

 

Surveillance

Effective Surveillance in Investigations

Conducting Effective Surveillance in Investigations: Why It Matters and How to Do It Right

By Frank Costa, President, Nexgen Protection Services

Effective surveillance remains one of the most powerful tools in professional investigations — but it’s more than just “watching someone.” By blending benefits, legal awareness, and tactical modalities, investigators can gather high-value intelligence while staying within ethical and legal boundaries.

Surveillance offers real-time insight into a subject’s behavior, patterns, and interactions — critical for criminal, civil, and fraud investigations. Whether through mobile (tailing a subject) or static (fixed observation) surveillance, investigators can collect evidence that supports case development, aids in pattern recognition, and enhances understanding of complex behaviors.

Modern investigations also leverage electronic and digital modalities — such as video footage, aerial systems, and online open-source intelligence — to extend observational reach without direct contact. These tools increase accuracy and evidence richness when used responsibly.

However, legalities are foundational: investigators must heed privacy laws, trespass restrictions, and regulatory limits. Licensed professionals cannot enter private property without permission, ignore clearly established privacy barriers, or employ deceptive or intimidating practices. Violations not only risk evidence being excluded in legal proceedings but can also result in civil and criminal liability or disciplinary action.

Preparation is equally pivotal. Successful surveillance depends on comprehensive planning — from understanding the subject’s routines, vehicles, and associates to pre-identifying observation points and ensuring communications readiness. Detailed documentation turns what was observed into actionable intelligence with integrity and defensibility.

In investigations, effective surveillance balances skill, technology, and law — yielding insights that assist in uncovering truths while upholding ethical standards.

Reference (APA 7th ed.)
Gaspar, J. M., & Luizzo, A. J. (2026, February 12). Conducting effective surveillance in investigations: Benefits, legalities, and modalities. Security Management. https://www.asisonline.org/security-management-magazine/articles/2026/02/investigation-surveillance/

#Investigations #Surveillance #LawEnforcement #Ethics #Privacy #RiskManagement #Evidence #SecurityProfessionals #InvestigativeBestPractices

 

Safe

Safe and Successful Festivals

Frank Costa, President, Nexgen Protection Services on safe protection —

A large, multi-day cultural festival welcomed tens of thousands of attendees for live music, food, and community experiences. With high crowd density and extended event hours, organizers partnered with protection services to ensure a safe, well-managed, and enjoyable environment for all guests.

Protection services were integrated into event planning from the outset. Crowd flow management strategies were designed to reduce congestion at entrances, stages, and high-traffic areas. Officers and event staff worked together to guide foot traffic, maintain clear emergency lanes, and adjust layouts in real time as crowd volumes shifted.

Protection services also coordinated closely with first-aid teams, emergency medical services, and local authorities. Medical response points were clearly marked, and officers were trained to identify signs of distress, enabling rapid assistance during heat-related incidents or minor injuries. This coordination ensured swift care without disrupting performances or guest experience.

A key focus was proactive communication with festivalgoers. Protection officers engaged guests through friendly interactions, provided directions and assistance, and shared safety information when needed. This approachable presence encouraged cooperation and early reporting of concerns, helping prevent issues before they escalated.

The festival concluded with record attendance and very low rates of serious injury or crime. Attendee feedback highlighted feeling safe, supported, and well-informed throughout the event, while organizers praised the seamless integration of protection services into festival operations.

Results:

  • High attendance with minimal safety incidents
  • Efficient crowd movement and emergency access
  • Rapid medical response and issue resolution
  • Positive guest experience maintained

Key takeaway:
When protection services prioritize planning, communication, and collaboration, large festivals can deliver memorable experiences in safe, welcoming environments.

#EventSecurity #FestivalSafety #PublicSafety #CrowdManagement #ProtectiveServices #RiskManagement #CommunityEvents #SecurityLeadership

 

Nexgen Protection Services on technology safety strategies.

Technology Supporting Safer Campuses

A large university sought to improve campus safety while maintaining an open, welcoming environment for students, faculty, and visitors. Protection services partnered with campus leadership to implement a technology-driven safety strategy focused on prevention, rapid communication, and community engagement.

Frank Costa, President, Nexgen Protection Services on technology safety strategies —

The initiative included launching a campus safety mobile app, upgrading the emergency mass-notification system, and expanding enhanced lighting and camera coverage in high-traffic and low-visibility areas. The safety app allowed users to quickly report suspicious activity, request escorts, and receive real-time alerts. Emergency notifications were redesigned for clarity and speed, ensuring critical information reached the campus community within seconds.

Protection services conducted outreach sessions to educate students and staff on how to use the new technology effectively. This proactive engagement increased adoption rates and encouraged shared responsibility for campus safety.

Within one academic year, the university recorded significantly faster alert dissemination during incidents, enabling quicker response and coordination by protection services. Reports of suspicious activity increased—not due to higher crime, but because students felt empowered and confident in reporting concerns early. Surveys also showed a measurable improvement in students’ perception of safety, particularly during evening hours.

Results of Security Technology:

  • Faster incident awareness and response times
  • Increased reporting and early threat identification
  • Improved student confidence and sense of security
  • Stronger connection between protection services and the campus community

 

Key takeaway:
When technology is paired with trained protection services and clear communication, it becomes a powerful tool for prevention, trust-building, and safer learning environments.

#CampusSafety #SecurityTechnology #StudentSafety #PublicSafety #RiskPrevention #SecurityLeadership #HigherEducation #ProtectiveServices

 

#GenAI

Human Oversight: The Key to Enterprise-Grade #GenAI

Generative AI (#GenAI) is transforming industries, from content creation to security operations. But as powerful as these tools are, human oversight remains critical for safe, reliable, and enterprise-ready implementation.

AI can assist in threat detection, monitoring, and data analysis—but it cannot fully understand context, ethical considerations, or subtle human judgment. That’s where skilled professionals step in. Security teams, IT managers, and organizational leaders must guide AI outputs, validate decisions, and intervene when anomalies arise.

Key reasons human oversight matters:


🔹 Accuracy & Reliability: Humans verify AI insights to reduce false positives and operational errors.
🔹 Ethical & Legal Compliance: Oversight ensures AI usage adheres to privacy, regulatory, and ethical standards.
🔹 Contextual Awareness: Humans interpret nuances that AI cannot, especially in complex security scenarios.
🔹 Continuous Improvement: Feedback loops from human review enhance AI performance over time.

Frank Costa, President, Nexgen Protection Services, we explore how AI can augment security operations without replacing human judgment. By pairing technology with trained personnel, enterprises gain both efficiency and assurance, moving #GenAI from experimentation to fully trusted operational deployment.

The future of enterprise AI is not autonomous—it’s collaborative, combining human insight with machine intelligence to drive safer, smarter outcomes.

#EnterpriseAI #GenAI #SecurityTechnology #AIoversight
#AIinBusiness #CyberSecurity #HumanInTheLoop #Innovation

APA Source
Smith, J. (2024). Why human oversight is essential for enterprise AI adoption. Harvard Business Review. Retrieved from https://hbr.org/2024/08/why-human-oversight-is-essential-for-enterprise-ai-adoption

Mental Health

Why Mental Health Matters in Security — Insights from John Rodriguez

In the demanding world of security, mental health isn’t a soft topic — it’s a professional imperative. John Rodriguez, Founder of Empathic Security Cultures LLC, emphasizes that security professionals face unique stressors that can impact performance, decision‑making, and overall well‑being if not properly addressed. 

Rodriguez draws attention to burnout, chronic stress, and psychological fatigue among security teams who are often on alert around the clock. These pressures, if left unchecked, can lead to diminished attentiveness, reduced resilience, and increased turnover — all of which can weaken organizational security. 

But it’s not just about the challenges — it’s about culture. Rodriguez advocates breaking down the stigma around mental health in the security profession, encouraging leaders to foster environments where psychological safety, empathy, and open communication are normal. This includes integrating support systems, training, and teamwork that acknowledge human experience as central to operational success. 

When mental health is prioritized alongside physical safety and procedural training, security teams become more resilient, more engaged, and more effective. And that stronger, healthier workforce directly benefits the organizations and communities they protect.

Frank Costa, President, Nexgen Protection Services, we recognize that security begins with people — and caring for their mental well‑being is essential to building teams that are not just strong, but sustainable.

#SecurityLeadership #MentalHealth #SecurityCulture #EmployeeWellbeing
#StressManagement #Resilience #PsychologicalSafety #SecurityTraining

APA Source
Alger, J. (2025). Key signs of mental health struggles in security. Security Magazine. Retrieved from https://www.securitymagazine.com/articles/102051-key-signs-of-mental-health-struggles-in-security

Avoiding a “Failure of Imagination”

Protecting American Flyers & Airport Staff — Avoiding a “Failure of Imagination”

The phrase “failure of imagination” entered the national lexicon after the 9/11 Commission concluded that U.S. intelligence agencies didn’t anticipate terrorists using commercial aircraft as weapons — not because it was impossible to imagine, but because it wasn’t adequately planned for ahead of time. Wikipedia

Today, preventing another tragic lapse in foresight requires forward‑thinking security strategies — not just reaction. For aviation security, this means embracing layered defenses that protect passengers, employees, and facilities from evolving threats before they materialize.

Key components of effective airport security include:

  • Proactive threat screening: Implementing advanced screening for aviation workers and passengers to detect a wider range of dangers, including weapons and prohibited items, helps strengthen defenses against insider and outsider threats. Security Magazine
    Training & preparedness: Security personnel trained to recognize subtle indicators of risk are more likely to detect unusual behavior — bridging gaps before problems escalate.
    Collaboration & intelligence sharing: Seamless communication between airlines, private security, federal agencies, and local law enforcement improves situational awareness and response times.

Avoiding a “Failure of Imagination”

Frank Costa, President, Nexgen Protection Services, we help organizations think ahead, train proactively, and act confidently. Security is not just about responding — it’s about anticipating. By embedding forward‑looking practices into aviation security plans, we strengthen safety for flyers and airport employees alike.

#AirportSecurity #AviationSafety #SecurityLeadership #ThreatPrevention
#CrisisPreparedness #ProactiveSecurity #DefenseInDepth #SecurityTraining

APA Source
Cunningham, B. (2025). No more failures of imagination: Future proofing airport employee screening. Security Magazine. Retrieved from https://www.securitymagazine.com/articles/102053-no-more-failures-of-imagination-future-proofing-airport-employee-screening

Security

Reflections on the Brown University Shooting and the Importance of Prepared Security

Prepared Security 

On December 13, 2025, a tragic shooting at Brown University in Providence, Rhode Island, claimed the lives of two students and wounded nine others during a study session in the Barus & Holley Engineering Building. The violent incident unfolded during finals week and sent shockwaves through the campus community and beyond.

In the days that followed, law enforcement coordinated a substantial investigation involving local, state, and federal partners. Enhanced surveillance footage and community tips supported search efforts, and ultimately officials identified a suspect linked to both the Brown shooting and another fatal attack outside the campus. Authorities later confirmed the suspect was found deceased from a self-inflicted injury as the manhunt concluded. 

As we mourn the lives lost and support the healing of survivors and families, this tragedy reinforces critical lessons for security leaders in all sectors:

  • Preparedness matters. Robust emergency alert systems and response protocols can save lives.
  • Collaboration saves time. Coordination among security teams, law enforcement, and community members is essential in a crisis.
  • Training protects people. Regular drills and clear communication help organizations respond confidently under pressure.

Frank Costa, President, Nexgen Protection Services, we are committed to supporting safety through trained security professionals, proactive threat awareness, and strong partnerships with our clients. Incidents like this remind us why vigilant planning, preparation, and community cooperation are cornerstones of effective safety strategies.

Our thoughts remain with the Brown community as it continues its path toward healing.

 

#CampusSafety #SecurityLeadership #CrisisResponse #ActiveShooterPreparedness
#EmergencyManagement #CommunitySafety #SecurityTraining #Collaboration

 

APA Source
Wikipedia contributors. (2025, December 20). 2025 Brown University shooting. In Wikipedia, The Free Encyclopedia. Retrieved December 20, 2025, from https://en.wikipedia.org/wiki/2025_Brown_University_shooting

 

Securing-the-Supply-Chain-Strengthen-Your-Enterprise-from-Every-Angle

Securing the Supply Chain: Strengthen Your Enterprise from Every Angle

By Frank Costa, President, Nexgen Protection Services

Is your enterprise a fortress with the back door left wide open?

With supply chain attacks rising 68% last year, your trusted vendors — the very partners you rely on — may be your biggest vulnerability. (Verizon, 2024)

Enter Cyber Supply Chain Risk Management (C-SCRM): a proactive approach to protecting your enterprise by managing risk across your entire ecosystem — not just within your walls.

Why Supply Chain Security Matters
Modern enterprises rely on interconnected vendors, contractors, and service providers. Each relationship is a potential entry point for attackers. A breach at a single supplier can cascade across your organization, disrupting operations, compromising data, and harming your reputation.

Key Components of C-SCRM

  • Vendor Risk Assessment: Evaluate third-party security practices before onboarding.

  • Continuous Monitoring: Track vulnerabilities, compliance, and emerging threats in real time.

  • Incident Response Coordination: Align your enterprise and vendor response plans to reduce impact.

  • Policy & Governance: Establish clear standards and enforce them across your ecosystem.

Benefits of a Proactive Approach
By implementing C-SCRM, organizations reduce exposure to third-party attacks, improve regulatory compliance, and gain actionable insights into potential weaknesses before they become crises.

The Bottom Line
A fortress is only as strong as its weakest gate. Protecting your enterprise today requires extending your risk management mindset to include every partner, supplier, and contractor in your supply chain.

The question isn’t if your enterprise will be targeted — it’s when. The difference is whether you’re ready.

#CyberSecurity #SupplyChainSecurity #EnterpriseRiskManagement #CSCRM #ThirdPartyRisk #RiskMitigation #BusinessContinuity #VendorManagement #CyberResilience

Reference
Verizon. (2024). 2024 Data Breach Investigations Report: Supply chain attacks increase 68%. Verizon Enterprise. (https://enterprise.verizon.com/resources/reports/dbir/)